- Neural and Behavioral Psychology Studies
- Cryptographic Implementations and Security
- Gaussian Processes and Bayesian Inference
- UAV Applications and Optimization
- Algorithms and Data Compression
- Advanced Data Compression Techniques
- Advanced Steganography and Watermarking Techniques
- Blind Source Separation Techniques
- Opportunistic and Delay-Tolerant Networks
- EEG and Brain-Computer Interfaces
- Statistical Methods and Bayesian Inference
- Advanced Wireless Communication Techniques
- Cognitive Radio Networks and Spectrum Sensing
- Image Retrieval and Classification Techniques
- Remote-Sensing Image Classification
- Bayesian Methods and Mixture Models
- Music and Audio Processing
- Chaos-based Image/Signal Encryption
- Ideological and Political Education
- Power Line Communications and Noise
- Mobile Ad Hoc Networks
- Advanced MIMO Systems Optimization
- Neural dynamics and brain function
- Face and Expression Recognition
- Speech and Audio Processing
National University of Modern Languages
2022-2024
Quaid-i-Azam University
2012-2021
In the past few decades, transmission of data over an unsecure channel has resulted in increased rate hacking. The requirement to make multimedia more secure is increasing day by day. Numerous algorithms have been developed improve efficiency and robustness encryption process. this article, a novel image algorithm presented. It based on modified chaotic logistic map (CLM) that provides advantage taking less computational time encrypt input image. Shannon’s idea using substitution–permutation...
The unmanned aerial vehicle communication networks (UAVCNs) are composed of vehicles (UAVs) connected in ad hoc mode to facilitate vertical 5G and beyond networks. UAVs operating an operation mostly use reactive routing protocols establish routes the network reduce energy consumption nodes. In this article, a route discovery method is presented overhead faced by during phase. expanding ring search (ERS) used destination phase algorithm. Although performance ERS better than simple flooding,...
Abstract In communication industry one of the most rapidly growing area is wireless technology and its applications. The efficient access to radio spectrum a requirement make this feasible for users that are running multimedia applications establishing real-time connections on an already overcrowded spectrum. recent times cognitive radios (CR) becoming prime candidates improved utilization available unlicensed secondary share with primary licensed user in such manners interference at does...
In the past few decades, transmission of data over an unsecure channel resulted in increased rate hacking. Therefore, requirement to make multimedia more secure is increasing day by day. Numerous algorithms are developed improve efficiency and robustness. this article, a novel image encryption algorithm presented. It based on modified chaotic logistic map (CLM) that provides advantage having less computational time encrypt input image. The Shannon’s idea using substitution-permutation...
A method based on multivariate mutual information (MMI) is proposed for face recognition. Unlike the existing frameworks, not hindered by rigorous computation feature extraction and learning spaces. The uses information-theoretic framework training set used to estimate underlying joint marginal densities, which are utilized calculate information. each pixel value highlight regions, that correspond maximum recognition process. Performance of evaluated two image datasets. performance also...
The dynamical systems are comprised of two components that change over time: the state space and observation models. This study examines parameter inference in from perspective Bayesian inference. Inference on unknown parameters nonlinear non-Gaussian is challenging because posterior densities corresponding to do not have traceable formulations. Such a system represented by Ricker model, which traditional discrete population model ecology epidemiology used many fields. study, deals with...
Cognitive processes are constantly under critical relevance in the field of neuroscience. In examination Electroencephalogram (EEG) data, frequency bands always significant because they determine how brain responds to various activities and circumstances different situations. However, it is usually accepted that each region associated with a certain activity, such as auditory, visual, or cognitive tasks. Moreover, retrieve additional information from brain, often required establish new...